Atomic Runbook: Get File Hash Threat Intel via SecOps MCP#
ID: RB-ATOM-HASH-002
Version: 1.0
Last_Updated: 2025-05-30
Purpose: To retrieve general threat intelligence about a file hash using the Chronicle secops-mcp
get_threat_intel
tool. This serves as a supplementary check for narrative context or an alternative if specialized tools yield no results.
Parent_Runbook(s)/Protocol(s): rules-bank/indicator_handling_protocols.md#3-atomic-indicator-file-hash
, rb_hash_get_gti_report.md
(as potential next step)
Trigger: When a file hash requires external threat intelligence, possibly after a GTI check, or if broader textual context is needed.
Inputs Required#
file_hash
: string - The file hash (MD5, SHA1, or SHA256) to query.Source Example: Alert data, output from other tools.
gti_confidence
(optional): string - Confidence from a preceding GTI check (e.g., “Unknown_Reputation_GTI”).
Execution Steps#
Tool Selection:
Primary_Tool_MCP_Server:
secops-mcp
Primary_Tool_Name:
get_threat_intel
Parameter Mapping:
Construct query:
query
: “Provide threat intelligence summary for file hash {file_hash}”
Execute Tool: Call
get_threat_intel
with thequery
.AI Agent Note: Refer to
rules-bank/mcp_tool_best_practices.md
.
Data Transformation/Extraction:
Output is textual. AI may parse for keywords.
Outputs Expected#
secops_ti_summary
: string - Textual threat intelligence summary.identified_keywords
: list (optional) - Keywords extracted by AI (e.g., “malware”, “dropper”, “benign utility”).output_status
: string - [“Success”, “Failure”]output_message
: string (if Failure).
Decision Logic / Next Steps (If Applicable)#
IF
output_status
is “Success”:IF
secops_ti_summary
contains “known malicious”, “malware family”, “trojan” THENFlag Hash as “High_Risk_SecOpsTI”.
Proceed to
rb_hash_lookup_entity_chronicle.md
.
ELSE IF
secops_ti_summary
contains “suspicious”, “hacktool”, “PUA” OR (gti_confidence
was “Unknown_Reputation_GTI” AND summary is not explicitly benign) THENFlag Hash as “Medium_Risk_SecOpsTI_Needs_Correlation”.
Proceed to
rb_hash_lookup_entity_chronicle.md
.
ELSE
Flag Hash as “Low_Risk_SecOpsTI” (or “Info_Only_SecOpsTI”).
Proceed to
rb_hash_lookup_entity_chronicle.md
.
ELSE (
output_status
is “Failure”):Log error:
output_message
.Escalate: “Failed to retrieve SecOps threat intelligence for file hash {file_hash}.”
AI Agent Execution Notes#
AI should perform NLP on
secops_ti_summary
foridentified_keywords
.Context from
gti_confidence
should inform interpretation.
Metrics Collection Points#
Log execution time.
Log
output_status
.(Reference
rules-bank/ai_performance_logging_requirements.md
)
References#
rules-bank/mcp_tool_best_practices.md
rules-bank/indicator_handling_protocols.md
rules-bank/ai_performance_logging_requirements.md